Not Your Father's Identity and Access Management
Enterprisesecuritymag >> cxoinsights

Martin Ingram, Product Owner, Identity and Access management, Royal Bank of Scotland (RBS)

It used to be easy to define the boundaries of Identity and Access Management (IAM)–its purpose was to prevent anyone getting to anything that they weren’t supposed to. While that is still true it fails to recognize the world that is...

The Challenge
Enterprisesecuritymag >> cxoinsights

Guy Grace,Director of Security and Emergency Planning at Littleton Public Schools

School districts face safety and security issues that are multifaceted and complex, and they must be prepared to address several situations that pose risks to students and staff that range from everyday occurrences like weather emergencies to the...

A New Approach to Identity and Access Management
Enterprisesecuritymag >> cxoinsights

Christian Aboujaoude, Sr. Director of Enterprise Architecture, Scripps Health

As the internet continues to evolve, it is becoming increasingly difficult to maintain control of all the elements that identify who we are as a user. With the proliferation of mobile smart devices and online services offered to consumers, a...

Fortifying the Network Security
Enterprisesecuritymag >> cioviewpoint

The secure network is a top priority. Network security combines multiple security layers of defense protecting proprietary information from cyber attacks. Network security can be delivered in 3 ways through the use of hardware appliance, software...

IoT Security Techniques Based on Machine Learning
Enterprisesecuritymag >> cxoinsights

The unstoppable growth of the Internet of Things (IoT) requires increasingly gleaming security measures. IoT,  integrating a variety of into networks to enable intelligent services makes it vulnerable towards security issues. It is...

Improving data security for AWS servers
Enterprisesecuritymag >> cioviewpoint

With an aim to reduce business cost while simultaneously boosting scalability, collaboration, and digitization, every organization is moving its entire IT infrastructure to the cloud. Amazon Web Services (AWS), one of the most popular cloud...

Headline: 7 Tips and Tools to Protect University Campuses from Cyber Attacks
Enterprisesecuritymag >> cioviewpoint

James Tagliareni, CIO, Washburn University

If you are like me, data security is a top priority. A recent report by the Identity Theft Resource Center shows that data breaches in the United States are occurring at a record pace this year, and that hacking, from phishing attacks, ransomware,...

Network Security: Critical System Defense
Enterprisesecuritymag >> vendor

Thomas P. Gresham, CISO, Port of San Diego

Prior to the Internet, Information Technology (IT) networks were self-contained and relatively free from cyberattacks. Now it is commonplace to read about data breaches, website defacement and system outages. All business supported by IT...

Gearing up To Protect against Security Breaches
Enterprisesecuritymag >> vendor

Paul Leury, CIO, & David Mason, Director, The Boon Group

Needless to say, for CIOs, security has always been on our radar. But it seems like members of our executive teams are just now joining us in our concern. In response to the increased frequency, impact, and media spectacle of security breaches,...

Is There Auditible Security in the Cloud?
Enterprisesecuritymag >> vendor

Preston Williams III, Senior Partner and CIO, GBC Global Services

I recently watched the CSPAN coverage of cloud computing in political campaigns held at the Graduate School of Political Management at George Washington University. Participants shared their views about cloud computing in campaigns, but the issue...

SALTO Systems Inc: Redefining Access Control with Relentless Innovation
Enterprisesecuritymag >> vendor

Bill Wood, President North America

SALTO Systems Inc has been redefining the access control world from 2001 by continually being first to anticipate market needs in a rapidly evolving marketplace. They set new standards in security,...

Kastle Systems: Leading the Way with an Open Approach to Security
Enterprisesecuritymag >> vendor

Haniel J. Lynn, CEO

As the physical and cyber-security realms are merging rapidly due to IoT proliferation, it is becoming a challenge for CIOs to draw a proper strategy to stay at the front of this change. Being a...

ShieldIO: Secure Your Data from InsideOut Using Real-Time™ Homomorphic Encryption
Enterprisesecuritymag >> vendor

AJ Jennings, Founder & CEO

ShieldIO’s real-time™ homomorphic encryption platform enables search on encrypted data down to the sub-field level with a unique derived key...

Mercury Processing Services International: Complete Payment Security Solutions
Enterprisesecuritymag >>

Giovanni Cetrangolo, Head of Strategic Projects and Innovation

A provider of payment solutions, Mercury Processing Services International is dedicated to developing and managing its payment business on an international level. Established in 2009, they specialize in Payment Processing Services, Acquiring...

SECUVE: Enhancing MFA with Behavioral Handwritten Signature Authentication
Enterprisesecuritymag >>

Ki-Yoong Hong, President & CEO

Provides robust solutions pertaining to MFA and biometrics that center around security assurance, and IAM

Building Intelligence: Purpose Built IAM for Building Security
Enterprisesecuritymag >>

Jeffrey C. Friedman, CEO

Building Intelligence is a software company which provides cutting edge technology solutions for security experts and building owners to control traffic of visitors, vehicles, and vendors. In addition to cutting down on operational costs and...